Improper Locking Affecting openssl package, versions <3.0.5-2ubuntu2.2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UBUNTU2210-OPENSSL-3167967
- published 13 Dec 2022
- disclosed 13 Dec 2022
Introduced: 13 Dec 2022
CVE-2022-3996 Open this link in a new tabHow to fix?
Upgrade Ubuntu:22.10
openssl
to version 3.0.5-2ubuntu2.2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:22.10
relevant fixed versions and status.
If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing server is not considered to be a common setup.
Policy processing is enabled by passing the -policy' argument to the command line utilities or by calling the
X509_VERIFY_PARAM_set1_policies()' function.
Update (31 March 2023): The description of the policy processing enablement was corrected based on CVE-2023-0466.